Insufficiently Protected Credentials in Texas Instruments Fusion Digital Power Designer v.7.10.1
2024-9-3 10:16:46 Author: seclists.org(查看原文) 阅读量:11 收藏

fulldisclosure logo

Full Disclosure mailing list archives


From: Gionathan Armando Reale via Fulldisclosure <fulldisclosure () seclists org>
Date: Sun, 1 Sep 2024 11:53:28 +0200

Insufficiently Protected Credentials in Texas Instruments Fusion Digital Power Designer v.7.10.1



Credit: Gionathan Armando Reale


//////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////

# Product:  Fusion Digital Power Designer - Version 7.10.1
# Vendor:   Texas Instruments
# CVE ID:   CVE-2024-41629
# Vulnerability Title: Insufficiently Protected Credentials
# Severity: Medium
# Author(s): Gionathan Armando Reale
# Date:     2024-08-15
#
#############################################################
Introduction:
An issue in Texas Instruments Fusion Digital Power Designer v.7.10.1 allows a local attacker to obtain sensitive 
information via the plaintext storage of credentials.

Vulnerability PoC:

1. Create a connection within the application that requires credentials.
2. Access the file "C:/Program Files (x86)/Texas Instruments/Fusion Digial Power Designer/data/prefs-shared.xml"
3. Notice the credentials stored as plaintext.




/////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: https://seclists.org/fulldisclosure/


Current thread:

  • Insufficiently Protected Credentials in Texas Instruments Fusion Digital Power Designer v.7.10.1 Gionathan Armando Reale via Fulldisclosure (Sep 02)

文章来源: https://seclists.org/fulldisclosure/2024/Sep/1
如有侵权请联系:admin#unsafe.sh